The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new approach for hiding information in digital audio based on the audio-to-image wavelet transform (A2IWT) and vector quantization (VQ). In our scheme, the cover audio signal is first transformed into an image by utilizing the wavelet transform and re-sampling the coefficients, then the secret data are embedded in the obtained image using a VQ-based image steganographic scheme,...
In detection theory, the optimal Neyman-Pearson rule applies when the characteristics of the signal and the noise are completely known. However, in many practical scenarios such as multipath or moving targets, only partial knowledge of the signal can be obtained. In this paper, we examine the case when the alternative hypothesis has multiple candidate models, and apply the multimodal sensor integration...
In the first part of this paper, we derive a generic form of optimization for binary hypothesis testing. We show that information theoretical as well as the proposed singular value decomposition (s.v.d.) based optimization methods are special cases of this generalization. In terms of robustness, neither the information theoretical nor the s.v.d. based optimization method has a contribution for decentralized...
A new transparent and robust watermarking method against JPEG compression attack based on a perceptual approach is proposed. The main idea is to embed the watermark into regions where the blocking artifact has no effect on the watermark. These regions are identified by using a spatial prediction model of blocking effect. A JND (Just-Noticeable-Difference) model is then used to control the embedding...
In many applications, very fast methods are required for estimating of amplitudes of current signals distorted by noise. In this paper new parallel algorithms are proposed, which can be implemented by analogue adaptive circuits employing selected neural networks principles. Algorithms based on the total least-squares (TLS) and the robust total least-squares (RTLS) criteria are developed and used to...
This paper provides a algorithm of digital watermarking in MP4 Music. Cooperating the characteristic of audio and using the energetic variation for three next sections to seek for the new appropriate method. The action of embedding digital watermark will not affect the quality of audio. Furthermore, this embedding will not only provides enough robustness to bear several kinds of attacks, including...
A novel image watermarking algorithm is developed which is based on Contourlet Transform (CT) and Matrix Factorization methods such as Singular Value Decomposition (SVD) technique and QR factorization method. In the proposed scheme, the original image and the watermark image are transformed into subbands by Contourlet Transform. The lowest frequency coefficients of the CT decomposed original image...
We study robust least squares problem with bounded data uncertainties in a competitive algorithm framework. We propose a competitive least squares (LS) approach that minimizes the worst case “regret” which is the difference between the squared data error and the smallest attainable squared data error of an LS estimator. We illustrate that the robust least squares problem can be put in an SDP form...
There are many studies on the performance of binary fingerprinting codes under a well-known marking assumption. Among many fingerprinting codes, we focus on Tardos codes and Nuida's variants. From the signal processing point of view, the relaxation of the assumption is required for the analysis. In this paper, we consider the averaging attack which has been studied in the spread-spectrum-based fingerprinting...
Multi-standard applications encounter several developments in the wireless systems. A single receiver is required for any standard of communication. Software Radio (SR) is an illustration of this concept. This paper presents a design methodology to ease the design of a flexible RF receiver based on an analog discrete time Fast Fourier Transform (FFT). A proposed architecture named SASP (Sampled Analog...
In a wireless sensor network each sensor node collects scalar measurements of some unknown parameters, corrupted by independent Gaussian noise. Then the objective is to estimate some parameters of interest from the data collected across the network. In this paper a simple iterative robust distributed linear parameter estimation algorithm is proposed where the diffusion co-operation scheme is incorporated...
Crosstalk cancellation is a well-known technique to deliver virtual 3D sound to a listener via two or more loudspeakers. In this method, the binaural source signals are processed with a network of prefilters prior to loudspeaker reproduction in order to ensure that only the prescribed source signals reach the corresponding ears of the listener, such that all acoustic crosstalk is cancelled out and...
Unlike traditional entropy in information theory, this work uses the normalized energy instead of probability to obtain a low-frequency amplitude transform (LAT) on coefficients of discrete wavelet transform (DWT). The watermark is embedded based on the properties and characteristics of this transform. Finally, performance of the proposed scheme is assessed by signal-to-watermark (SWR) and bit error...
Playfield detection is one of important tasks in sports video analysis. Although some encouraging results have been achieved, the robustness of playfield detection still needs to be enhanced. To the best of our knowledge, traditional methods for playfield detection usually using various color features. Detection results are unstable when there are shadows on the playfield. In this paper, an effective...
Meridian estimator for location determination for data samples obeying symmetric heavy tail distributions is considered. It is shown that such estimator should and can adapt to tail heaviness. Adaptation can be carried out by setting a tunable parameter δ proportional to data scale and dependent on tail heaviness. The latter property can be characterized by robust estimate of kurtosis. Experiments...
For assessing the separation performance (quality and accuracy) of ICA estimators, several performance indices have been introduced in the literature. The purpose of this note is to outline, review and study the properties of performance indices as well as propose some new ones. Special emphasis is put on the properties that such performance indices ought to satisfy. We categorize the indices in two...
In this paper, a novel algorithm for bandwidth reduction in adaptive distributed learning is introduced. We deal with diffusion networks, in which the nodes cooperate with each other, by exchanging information, in order to estimate an unknown parameter vector of interest. We seek for solutions in the framework of set theoretic estimation. Moreover, in order to reduce the required bandwidth by the...
New promising technique for information hiding in vocalized Arabic text is proposed in this paper. This technique makes use of diacritics (vowel signs), which are optional to put, by showing or omitting them to hide bits. The technique is found to be very useful due to the considerable provided capacity, and because every possible diacritic in the cover text is used to hide bits. In this method, even...
This paper presents an adaptive beamformer for smart antennas, which is able to steer its main beam and nulls in azimuth over a wide frequency band, without tape delay lines or frequency filters. This is achieved based on fully spatial signal processing techniques wherein a two-dimensional antenna array operates as a spatial filter, processing the received signals with only weighting schemes. Previous...
This work deals with the synchronization of chaotic systems with parameter mismatch or fluctuations. A variable structure control approach is firstly proposed to realize and maintain the synchronization. Then by applying its robustness, we modify the switching manifold and implement the synchronization only via a scalar transmitted signal in the case of system's parameter fluctuation or mismatch....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.